2014
DOI: 10.1007/s11432-014-5176-7
|View full text |Cite
|
Sign up to set email alerts
|

On τ-time secure key agreement

Abstract: Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode Science in China Series F-Information Sciences 52, 1358 (2009); A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…With the rapid advances of wireless communications, the conventional cryptographic encryption [1,2] used in the upper layers of communication networks has encountered more challenges in areas such as key distribution and management. For this reason, physical layer security that exploits the characteristics of wireless channels to guarantee secure transmission has recently become an active research area.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…With the rapid advances of wireless communications, the conventional cryptographic encryption [1,2] used in the upper layers of communication networks has encountered more challenges in areas such as key distribution and management. For this reason, physical layer security that exploits the characteristics of wireless channels to guarantee secure transmission has recently become an active research area.…”
Section: Introductionmentioning
confidence: 99%
“…We assume that Δ b,m ∼ CN (0, Q b,m ), Q b,m 0 and Δ e,k ∼ CN (0, Q e,k ), Q e,k 0. According to (1) and (2), the SINRs of the mth Bob and the k th Eve which eavesdrops the mth data stream can be, respectively, expressed as…”
Section: Introductionmentioning
confidence: 99%